Full lifecycle security management scheme for terminal keys under power IoT

Aiming at the terminal access and terminal communication security problems under Power IoT, a full lifecycle security management scheme for terminal keys under Power IoT is proposed in this paper. Firstly, the two-stage key distribution architecture based on the state secret algorithm is adopted in...

Full description

Saved in:
Bibliographic Details
Main Authors: Wang Hui, Yuan Jiahui, Shi Zhentong, Fang Mu
Format: Article
Language:zho
Published: National Computer System Engineering Research Institute of China 2025-01-01
Series:Dianzi Jishu Yingyong
Subjects:
Online Access:http://www.chinaaet.com/article/3000169885
Tags: Add Tag
No Tags, Be the first to tag this record!